Page 8 of 73 results (0.006 seconds)

CVSS: 10.0EPSS: 9%CPEs: 76EXPL: 2

Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. • ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 10.0EPSS: 4%CPEs: 31EXPL: 2

Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). • https://www.exploit-db.com/exploits/19102 https://www.exploit-db.com/exploits/19101 ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX http://www.securityfocus.com/bid/122 •

CVSS: 9.3EPSS: 0%CPEs: 9EXPL: 0

SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/166 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 2

Buffer overflow in SGI IRIX mailx program. • https://www.exploit-db.com/exploits/19311 https://www.exploit-db.com/exploits/19312 ftp://patches.sgi.com/support/free/security/advisories/19980605-01-PX •